-
"Spike in Amazon Prime Scams Expected"For online shoppers, Amazon Prime Day has become an annual retail event, an opportunity to pick up bargains and save money. Security researchers at Avanan have warned of an increase in phishing and credential harvesting email attempts in June…
-
"Researchers Defeat Facial Recognition Systems With Universal Face Mask"A team of researchers at Ben-Gurion University of the Negev and Tel Aviv University have proven that it is possible for attackers to create a face mask capable of defeating modern facial recognition systems. They validated the effectiveness of their…
-
"'Callback' Phishing Campaign Impersonates Security Firms"A new callback phishing campaign impersonates well-known security firms in order to trick potential victims into making a phone call that will instruct them to download malware. CrowdStrike Intelligence researchers discovered the campaign because…
-
"Paladin Cloud Launches New Cloud Security and Governance Platform"Securing the infrastructure remains challenging as more organizations migrate their data, applications, and workloads to the cloud. Because security teams do not always know what is going on in each cloud environment, it is difficult to detect when…
-
"Hackers Can Unlock Honda Cars Remotely in Rolling-PWN Attacks"A group of security researchers discovered that several modern Honda vehicle models have a vulnerable rolling code mechanism that allows remote unlocking and engine starting. The vulnerability, called Rolling-PWN, enables replay attacks in which a threat…
-
"Building Trust and Protecting Data to Support Kids in Iowa"Determining whether early childhood services should be improved or expanded needs good data, but obtaining that data is difficult when the entities providing resources and support to families with young children, such as federal and state departments,…
-
"NSA Issued an Advisory for System Administrators to use PowerShell for Detecting Malicious Activity"NSA recommends that system administrators use PowerShell to manage systems. The Windows program can detect and prevent hacking and other suspicious activity. This tool with its inherent security features can be helpful to admins trying to defend systems…
-
"Your Brain Is Better at Busting Deepfakes Than You"Deepfake videos, images, audio, or text may appear to be authentic, but they are computer-generated clones intended to mislead people and sway public opinion. They are used to spread disinformation and appear in cybersecurity, politics, counterfeiting,…
-
"Pro-Russian Cybercriminals Briefly DDoS Congress.gov"Recently a pro-Russian cybercrime group attacked the Congress.gov web domain resulting in temporary downtime that "briefly affected public access," the Library of Congress stated. KillNet, a pro-Russian group, launched a series of distributed…
-
"Twitter Says it Removes 1 Million Spam Accounts a Day"Twitter recently announced that it removes 1 million spam accounts each day. Twitter said the spam accounts represent well below 5% of its active user base each quarter. To calculate how many accounts are malicious spam, Twitter reviews “…
-
"New Phishing Attacks Shame, Scare Victims into Surrendering Twitter, Discord Credentials"Recent social media phishing scams have intensified their scare tactics by making false accusations of account abuse in order to force victims into providing their login information. Two phishing attacks on Twitter and Discord were recently discovered by…
-
"Emsisoft Releases Free Decryptor For AstraLocker and Yashma Ransomware"Cybersecurity solutions provider Emsisoft has recently released a free decryption tool to enable AstraLocker and Yashma ransomware victims to recover their files without paying a ransom. The company noted that the AstraLocker decryptor is for the…
News